Paper
16 May 2002 Authentication, integrity, and confidentiality in DICOM-structured reporting: concept and implementation
Joerg Riesmeier, Marco Eichelberg, Klaus Kleber, Dietrich H.W. Groenemeyer, Herman J. Oosterwijk, Peter F. Jensch
Author Affiliations +
Abstract
With the release of 'DICOM Structured Reporting' (SR) as an official extension of the standard about two years ago, DICOM has entered a new domain that is only indirectly related to medical imaging. Basically, DICOM SR is a general model allowing to encode medical reports in a structured manner in DICOM's tag-based format. Therefore, the existing DICOM infrastructure can be used to archive and communicate structured reports, with only relatively small changes to existing systems. As a consequence of the introduction of medical reports in a digital form, the relevance of security measures increases significantly. We have developed a prototype implementation of DICOM structured reporting together with the new security extensions for secure transport connections and digital signatures. The application allows to create, read and modify any SR document, to digitally sign an SR document in whole or part and to transmit such documents over a network. While the secure transport connection protects data from modifications or unauthorized access only during transmission, digital signatures provide a lifetime integrity check and, therefore, maintain the legal document status of structured reports. The application has been successfully demonstrated at RSNA 2000 and ECR 2001, and is freely available on the Internet.
© (2002) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Joerg Riesmeier, Marco Eichelberg, Klaus Kleber, Dietrich H.W. Groenemeyer, Herman J. Oosterwijk, and Peter F. Jensch "Authentication, integrity, and confidentiality in DICOM-structured reporting: concept and implementation", Proc. SPIE 4685, Medical Imaging 2002: PACS and Integrated Medical Information Systems: Design and Evaluation, (16 May 2002); https://doi.org/10.1117/12.467016
Lens.org Logo
CITATIONS
Cited by 3 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Network security

Data communications

Information security

Internet

Telecommunications

Prototyping

RELATED CONTENT

Survey of cyber security issues in smart grids
Proceedings of SPIE (April 28 2010)
A proxy of DICOM services
Proceedings of SPIE (March 11 2010)
Creating the virtual enterprise with VE gateways
Proceedings of SPIE (January 21 1997)
Using overlays to improve network security
Proceedings of SPIE (July 08 2002)
Secret communication by using data hiding in IPv6
Proceedings of SPIE (May 04 2007)

Back to Top